cregit-Linux how code gets into the kernel

Release 4.11 arch/mips/kernel/signal32.c

Directory: arch/mips/kernel
/*
 * This file is subject to the terms and conditions of the GNU General Public
 * License.  See the file "COPYING" in the main directory of this archive
 * for more details.
 *
 * Copyright (C) 1991, 1992  Linus Torvalds
 * Copyright (C) 1994 - 2000, 2006  Ralf Baechle
 * Copyright (C) 1999, 2000 Silicon Graphics, Inc.
 * Copyright (C) 2016, Imagination Technologies Ltd.
 */
#include <linux/compiler.h>
#include <linux/errno.h>
#include <linux/kernel.h>
#include <linux/signal.h>
#include <linux/syscalls.h>

#include <asm/compat.h>
#include <asm/compat-signal.h>
#include <linux/uaccess.h>
#include <asm/unistd.h>

#include "signal-common.h"

/* 32-bit compatibility types */


typedef unsigned int __sighandler32_t;

typedef void (*vfptr_t)(void);

/*
 * Atomically swap in the new signal mask, and wait for a signal.
 */


asmlinkage int sys32_sigsuspend(compat_sigset_t __user *uset) { return compat_sys_rt_sigsuspend(uset, sizeof(compat_sigset_t)); }

Contributors

PersonTokensPropCommitsCommitProp
Harvey Hunt1881.82%120.00%
Paul Burton29.09%240.00%
Ralf Bächle29.09%240.00%
Total22100.00%5100.00%

SYSCALL_DEFINE3(32_sigaction, long, sig, const struct compat_sigaction __user *, act, struct compat_sigaction __user *, oact) { struct k_sigaction new_ka, old_ka; int ret; int err = 0; if (act) { old_sigset_t mask; s32 handler; if (!access_ok(VERIFY_READ, act, sizeof(*act))) return -EFAULT; err |= __get_user(handler, &act->sa_handler); new_ka.sa.sa_handler = (void __user *)(s64)handler; err |= __get_user(new_ka.sa.sa_flags, &act->sa_flags); err |= __get_user(mask, &act->sa_mask.sig[0]); if (err) return -EFAULT; siginitset(&new_ka.sa.sa_mask, mask); } ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); if (!ret && oact) { if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact))) return -EFAULT; err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); err |= __put_user((u32)(u64)old_ka.sa.sa_handler, &oact->sa_handler); err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); err |= __put_user(0, &oact->sa_mask.sig[1]); err |= __put_user(0, &oact->sa_mask.sig[2]); err |= __put_user(0, &oact->sa_mask.sig[3]); if (err) return -EFAULT; } return ret; }
int copy_siginfo_to_user32(compat_siginfo_t __user *to, const siginfo_t *from) { int err; if (!access_ok (VERIFY_WRITE, to, sizeof(compat_siginfo_t))) return -EFAULT; /* If you change siginfo_t structure, please be sure this code is fixed accordingly. It should never copy any pad contained in the structure to avoid security leaks, but must copy the generic 3 ints plus the relevant union member. This routine must convert siginfo from 64bit to 32bit as well at the same time. */ err = __put_user(from->si_signo, &to->si_signo); err |= __put_user(from->si_errno, &to->si_errno); err |= __put_user((short)from->si_code, &to->si_code); if (from->si_code < 0) err |= __copy_to_user(&to->_sifields._pad, &from->_sifields._pad, SI_PAD_SIZE); else { switch (from->si_code >> 16) { case __SI_TIMER >> 16: err |= __put_user(from->si_tid, &to->si_tid); err |= __put_user(from->si_overrun, &to->si_overrun); err |= __put_user(from->si_int, &to->si_int); break; case __SI_CHLD >> 16: err |= __put_user(from->si_utime, &to->si_utime); err |= __put_user(from->si_stime, &to->si_stime); err |= __put_user(from->si_status, &to->si_status); default: err |= __put_user(from->si_pid, &to->si_pid); err |= __put_user(from->si_uid, &to->si_uid); break; case __SI_FAULT >> 16: err |= __put_user((unsigned long)from->si_addr, &to->si_addr); break; case __SI_POLL >> 16: err |= __put_user(from->si_band, &to->si_band); err |= __put_user(from->si_fd, &to->si_fd); break; case __SI_RT >> 16: /* This is not generated by the kernel as of now. */ case __SI_MESGQ >> 16: err |= __put_user(from->si_pid, &to->si_pid); err |= __put_user(from->si_uid, &to->si_uid); err |= __put_user(from->si_int, &to->si_int); break; case __SI_SYS >> 16: err |= __copy_to_user(&to->si_call_addr, &from->si_call_addr, sizeof(compat_uptr_t)); err |= __put_user(from->si_syscall, &to->si_syscall); err |= __put_user(from->si_arch, &to->si_arch); break; } } return err; }

Contributors

PersonTokensPropCommitsCommitProp
Harvey Hunt29570.41%114.29%
Linus Torvalds (pre-git)8420.05%228.57%
Franck Bui-Huu368.59%114.29%
Ralf Bächle30.72%228.57%
Martin Michlmayr10.24%114.29%
Total419100.00%7100.00%


int copy_siginfo_from_user32(siginfo_t *to, compat_siginfo_t __user *from) { if (copy_from_user(to, from, 3*sizeof(int)) || copy_from_user(to->_sifields._pad, from->_sifields._pad, SI_PAD_SIZE32)) return -EFAULT; return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Harvey Hunt2546.30%111.11%
Linus Torvalds (pre-git)1120.37%111.11%
Ralf Bächle59.26%333.33%
Al Viro59.26%111.11%
Richard Weinberger47.41%111.11%
Atsushi Nemoto23.70%111.11%
Franck Bui-Huu23.70%111.11%
Total54100.00%9100.00%


Overall Contributors

PersonTokensPropCommitsCommitProp
Harvey Hunt55664.65%14.00%
Linus Torvalds (pre-git)19422.56%28.00%
Franck Bui-Huu647.44%28.00%
Ralf Bächle161.86%936.00%
Andrew Morton60.70%28.00%
Atsushi Nemoto60.70%28.00%
Al Viro50.58%14.00%
Paul Burton50.58%28.00%
Richard Weinberger40.47%14.00%
David Daney20.23%14.00%
Martin Michlmayr10.12%14.00%
Linus Torvalds10.12%14.00%
Total860100.00%25100.00%
Directory: arch/mips/kernel
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.